InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Developments in Privileged Access Management

Presented by

Yeghisabet Alaverdyan, Head of Systems Integration | EKENG CJSC

About this talk

Privileged access management (PAM) is evolving to meet the challenges of modern centralized, decentralized, distributed networks, and endpoints. Cutting-edge solutions now incorporate AI-driven anomaly detection to monitor and flag unusual privileged account behavior, coupled with just-in-time (JIT) privilege escalation for temporary, task-specific access. Unified dashboards enhance visibility and streamline management across hybrid IT environments. In decentralized networks, blockchain technology ensures tamper-proof identity management, while decentralized authentication leverages cryptographic keys to reduce reliance on central directories. Federated access models facilitate secure privilege sharing across domains without exposing sensitive credentials. For distributed networks, Zero Trust Architecture (ZTA) enforces continuous verification of users and devices, while edge computing integration secures privileged access directly at network endpoints. Dynamic policy enforcement adapts in real time, responding to contextual factors like user location or device status. On endpoints, Endpoint Privilege Management (EPM) minimizes attack surfaces by granting least-privilege access. Device-centric identity management ties privileges to specific devices, and behavioral analytics monitor endpoint activities for unauthorized privilege use. These advancements collectively enable robust, scalable, and context-aware PAM strategies across diverse network architectures. Discover how rigorous inspection, computing science, algebra, and technology combine to combat unauthorized access, protect company assets, and build user trust.
Information Security

Information Security

259135 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics